Views:

Container Vulnerability Schema Change

  • Original Schema
    scanID string
    scantime Epoch timestamp
    clusterID string
    clusterName string
    imageID string
    registry string
    repository string
    imageDigest string
    vulnerabilityname string
    description string
    softwarelist Array of objects
    cveLink string
    cverecord:
    • id
    • publishedDateTime
    • exploitAttemptCount (Optional)
    • globalExploitActivityLevel (Optional)
    • cvssScore
    • protectionRules (Optional)
    Object
  • New Schema
    scantime Epoch timestamp
    scanID string
    clusterID string
    clusterName string
    imageID string
    registry string
    repository string
    imageDigest string
    vulnerabilityname string
    description string
    softwarelist Array of objects
    cveLink string
    cverecord:
    • id
    • publishedDateTime
    • exploitAttemptCount (Optional)
    • globalExploitActivityLevel (Optional)
    • cvssScore
    • protectionRules (Optional)
    Object

Export Assets Report Schema change

  • Original Schema
    projectID string
    projectName string
    customAssetTags Object
    platformAssetTags Object
    clusterID string
    clusterType string
    clusterTypeDetail string
    imageID string
    imageName string
    imageVersion string
    imageDigest string
    imageRegistry string
    imageAnnoations Object
    containerInfo Object
    scanTime string
  • New Schema
    scantime Epotch timestamp
    projectID string
    projectName string
    customAssetTags Object
    platformAssetTags Object
    clusterID string
    clusterType string
    clusterTypeDetail string
    imageID string
    imageName string
    imageVersion string
    imageDigest string
    imageRegistry string
    imageAnnoations Object
    containerInfo Object
    scanTime (deprecated, may be removed in future) string

Trend Micro advises customers to pay attention to the possible impact of the log changes to their configured Splunk HEC and AWS S3 connectors.